In this AKS-focused workshop, you will work with Microsoft Azure and Calico Cloud to learn how to employ Calico Cloud in order to visualize cluster traffic and pinpoint security vulnerabilities within your Kubernetes AKS cluster.
In today's highly interconnected and digital landscape, ensuring the security of your AKS Kubernetes clusters is an absolute necessity. This workshop provides you with the essential knowledge and skills to strengthen your cluster's defenses thoroughly, guaranteeing the safeguarding of vital workloads and sensitive information. It enables you to tailor security measures to suit your organization's specific needs and keeps you at the forefront of cybersecurity in a swiftly evolving environment.
The field of cybersecurity is currently experiencing a strong demand, and acquiring the skill set to effectively secure Kubernetes environments is highly valuable. Regardless of whether you're an IT administrator, developer, or a security professional, the knowledge gained from this workshop will significantly improve your expertise, making you an indispensable asset to your organization. Furthermore, by proactively implementing robust security measures, you can protect your organization from potential financial losses and reputational harm that may arise from security breaches.
Make sure not to overlook this chance to enhance your security expertise, safeguard your infrastructure, and propel your professional development forward.
Upon completing this workshop, you will gain insights into how professionals in your industry secure and monitor cloud-native applications in Microsoft Azure. You'll also acquire valuable best practices that you can apply within your organization.
The estimated time to complete this workshop is 60-90 minutes.
- Cloud Professionals
- DevSecOps Professional
- Site Reliability Engineers (SRE)
- Solutions Architects
- Anyone interested in Calico Cloud :)
- Learn how to analyze service-to-service communication to evaluate the security risk posed by network-based threats.
- Visualize notifications when malware is executed within your workloads.
- Detect and prevent anomalous behaviors such as attempts to access restricted URLs.
- Discover how to quarantine workloads to prevent the lateral movement of the threat.
- Learn how to build and enforce security policy to stop command and control attack.
⚠️ For this workshop, you are expected to have access to a previously created AKS cluster.
-
Please, follow the instructions on the repository below if you don't have it ready:
-
We will run this workshop from the Azure Cloud Shell, as described in that repository.
-
To start your cluster, reload the environment variables create in your Azure Cloud Shell first and then start the cluster. Use the following command:
source ~/workshopvars.env az aks start --resource-group $RESOURCE_GROUP --name $CLUSTERNAME
This workshop is organized in sequential modules. One module will build up on top of the previous module, so please, follow the order as proposed below.
Module 1 - Connect the AKS cluster to Calico Cloud
Module 2 - Analyze service-to-service communication
Module 3 - Malware protection, access control and quarantine with Thread Defence
Module 4 - Enforcing security policy to stop C&C attacks
Module 5 - Clean up
- Project Calico
- Calico Academy - Get Calico Certified!
- O’REILLY EBOOK: Kubernetes security and observability
- Calico Users - Slack
Follow us on social media
Note: The workshop provides examples and sample code as instructional content for you to consume. These examples will help you understand how to configure Calico Cloud and build a functional solution. Please note that these examples are not suitable for use in production environments.